Page 3,732«..1020..3,7313,7323,7333,734..3,7403,750..»

COVID-19: AI can help – but the right human input is key – World Economic Forum

Artificial intelligence (AI) has the potential to help us tackle the pressing issues raised by the COVID-19 pandemic. It is not the technology itself, though, that will make the difference but rather the knowledge and creativity of the humans who use it.

Indeed, the COVID-19 crisis will likely expose some of the key shortfalls of AI. Machine learning, the current form of AI, works by identifying patterns in historical training data. When used wisely, AI has the potential to exceed humans not only through speed but also by detecting patterns in that training data that humans have overlooked.

However, AI systems need a lot of data, with relevant examples in that data, in order to find these patterns. Machine learning also implicitly assumes that conditions today are the same as the conditions represented in the training data. In other words, AI systems implicitly assume that what has worked in the past will still work in the future.

A new strain of Coronavirus, COVID 19, is spreading around the world, causing deaths and major disruption to the global economy.

Responding to this crisis requires global cooperation among governments, international organizations and the business community, which is at the centre of the World Economic Forums mission as the International Organization for Public-Private Cooperation.

The Forum has created the COVID Action Platform, a global platform to convene the business community for collective action, protect peoples livelihoods and facilitate business continuity, and mobilize support for the COVID-19 response. The platform is created with the support of the World Health Organization and is open to all businesses and industry groups, as well as other stakeholders, aiming to integrate and inform joint action.

As an organization, the Forum has a track record of supporting efforts to contain epidemics. In 2017, at our Annual Meeting, the Coalition for Epidemic Preparedness Innovations (CEPI) was launched bringing together experts from government, business, health, academia and civil society to accelerate the development of vaccines. CEPI is currently supporting the race to develop a vaccine against this strand of the coronavirus.

What does this have to do with the current crisis? We are facing unprecedented times. Our situation is jarringly different from that of just a few weeks ago. Some of what we need to try today will have never been tried before. Similarly, what has worked in the past may very well not work today.

Humans are not that different from AI in these limitations, which partly explains why our current situation is so daunting. Without previous examples to draw on, we cannot know for sure the best course of action. Our traditional assumptions about cause and effect may no longer hold true.

Humans have an advantage over AI, though. We are able to learn lessons from one setting and apply them to novel situations, drawing on our abstract knowledge to make best guesses on what might work or what might happen. AI systems, in contrast, have to learn from scratch whenever the setting or task changes even slightly.

The COVID-19 crisis, therefore, will highlight something that has always been true about AI: it is a tool, and the value of its use in any situation is determined by the humans who design it and use it. In the current crisis, human action and innovation will be particularly critical in leveraging the power of what AI can do.

One approach to the novel situation problem is to gather new training data under current conditions. For both human decision-makers and AI systems alike, each new piece of information about our current situation is particularly valuable in informing our decisions going forward. The more effective we are at sharing information, the more quickly our situation is no longer novel and we can begin to see a path forward.

Projects such as the COVID-19 Open Research Dataset, which provides the text of over 24,000 research papers, the COVID-net open-access neural network, which is working to collaboratively develop a system to identify COVID-19 in lung scans, and an initiative asking individuals to donate their anonymized data, represent important efforts by humans to pool data so that AI systems can then sift through this information to identify patterns.

Global spread of COVID-19

Image: World Economic Forum

A second approach is to use human knowledge and creativity to undertake the abstraction that the AI systems cannot do. Humans can discern between places where algorithms are likely to fail and situations in which historical training data is likely still relevant to address critical and timely issues, at least until more current data becomes available.

Such systems might include algorithms that predict the spread of the virus using data from previous pandemics or tools that help job seekers identify opportunities that match their skillsets. Even though the particular nature of COVID-19 is unique and many of the fundamental rules of the labour market are not operating, it is still possible to identify valuable, although perhaps carefully circumscribed, avenues for applying AI tools.

Efforts to leverage AI tools in the time of COVID-19 will be most effective when they involve the input and collaboration of humans in several different roles. The data scientists who code AI systems play an important role because they know what AI can do and, just as importantly, what it cant. We also need domain experts who understand the nature of the problem and can identify where past training data might still be relevant today. Finally, we need out-of-the-box thinkers who push us to move beyond our assumptions and can see surprising connections.

Toronto-based startup Bluedot is an example of such a collaboration. In December it was one of the first to identify the emergence of a new outbreak in China. Its system relies on the vision of its founder, who believed that predicting outbreaks was possible, and combines the power several different AI tools with the knowledge of epidemiologists who identified where and how to look for evidence of emerging diseases. These epidemiologists also verify the results at the end.

Reinventing the rules is different from breaking the rules, though. As we work to address our current needs, we must also keep our eye on the long-term consequences. All of the humans involved in developing AI systems need to maintain ethical standards and consider possible unintended consequences of the technologies they create. While our current crisis is very pressing, we cannot sacrifice our fundamental principles to address it.

The key takeaway is this: Despite the hype, there are many ways that humans in which still surpass the capabilities of AI. The stunning advances that AI has made in recent years are not an inherent quality of the technology, but rather a testament to the humans who have been incredibly creative in how they use a tool that is mathematically and computationally complex and yet at its foundation still quite simple and limited.

As we seek to move rapidly to address our current problems, therefore, we need to continue to draw on this human creativity from all corners, not just the technology experts but also those with knowledge of the settings, as well as those who challenge our assumptions and see new connections. It is this human collaboration that will enable AI to be the powerful tool for good that it has the potential to be.

License and Republishing

World Economic Forum articles may be republished in accordance with our Terms of Use.

Written by

Matissa Hollister, Assistant Professor of Organizational Behaviour, McGill University

The views expressed in this article are those of the author alone and not the World Economic Forum.

Continued here:
COVID-19: AI can help - but the right human input is key - World Economic Forum

Read More..

6 Visions of How Artificial Intelligence will Change Architecture – ArchDaily

6 Visions of How Artificial Intelligence will Change Architecture

Facebook

Twitter

Pinterest

Whatsapp

Mail

Or

In his book "Life 3.0", MIT professor Max Tegmark says "we are all the guardians of the future of life now as we shape the age of AI." Artificial Intelligence remains a Pandora's Box of possibilities, with the potential to enhance the safety, efficiency, and sustainability of cities, or destroy the potential for humans to work, interact, and live a private life. The question of how Artificial Intelligence will impact the cities of the future has also captured the imagination of architects and designers, and formed a central question to the 2019 Shenzhen Biennale, the world's most visited architecture event.

As part of the "Eyes of the City" section of the Biennial, curated by Carlo Ratti, designers were asked to put forth their visions and concerns of how artificial intelligence will impact the future of architecture. Below, we have selected six visions, where designers reflect in their own words on aspects from ecology and the environment to social isolation. For further reading on AI and the Shenzhen Biennial, see our interview with Carlo Ratti and Winy Maas on the subject, and visit our dedicated landing page of content here.

The advance of AI technologies can make it feel as if we know everything about our citiesas if all city dwellers are counted and accounted for, our urban existence fully monitored, mapped, and predicted.

But what happens when we train our attention and technologies on the non-human beings with whom we share our urban environments? How can our notion of urban life, and the possibilities to design for it, expand when we use technology to visualize more than just the relationship between humans and human-made structures?

There is much we have yet to discover about our evolving urban environments. As new technologies are developed, deployed, and appropriated, it is critical to ask how they can help us see both the city and our discipline differently. Can architecture and urban design become a multi-species, collaborative practice? The first step is opening our eyes to all of our fellow city dwellers.

Read the full article here

For all of their history, the machines around us have stood silent, but when the city acquires the ability to see, to listen and to talk back to us, what might constitute a meaningful reciprocal interaction? Is it possible to have a productive dialogue with an autonomous shipping crane loading containers into the hull of a ship at a Chinese mega port; or, how do we ask a question of a warehouse filled with a million objects or talk to a city managing itself based on aggregated data sets from an infinite network of media feeds? Consumer-facing AIs like Amazons Alexa, Microsofts Cortana, Google Assistant or Apples Siri repeat biases and forms of interactions which are a legacy of human to human relationships. If you ask Microsofts personal digital assistant Cortana if she is a woman she replies Well, technically I'm a cloud of infinitesimal data computation. It is unclear if Cortana is a she or an it or a they. Deborah Harrison, the lead writer for Cortana, uses the pronoun she when referring to Cortana but is also explicit in stating that this does not mean she is female, or that she is human or that a gender construct could even apply in this context. We are very clear that Cortana is not only not a person, but there is no overlay of personhood that we ascribe, with the exception of the gender pronoun, Harrison explains. We felt that it was going to convey something impersonal and while we didnt want Cortana to be thought of as human, we dont want her to be impersonal or feel unfamiliar either.

Read the full article here

AI (artificial intelligence) can transform the environment we live in. Cities are facing the rise of UI (urban intelligence). Micro sensors and smart handheld electronics can gather large amounts of information. Mobile sensors, referred to as urban tech, allow cars, buses, bicycles, and even citizens to collect information about air quality, noise pollution, and the urban infrastructure at large. For example, noise data can be captured, archived, and made accessible. In an effort to contribute toward urban noise mitigation, citizens will be able to measure urban soundscapes, and urban planners and city councils can react to the data. How will our lives change intellectually, physically, and emotionally as the Internet of Things migrates into urban environments? How does technology intersect with society?

Read the full article here

Thanks to the development of the digital world, cities can be part of natural history. This is our great challenge for the next few decades, The digital revolution should allow us to promote an advanced, ecological and human world. Being digital was never the goalit was a means to reinvent the world. But what kind of world?

In many cases, digital allows us to continue doing everything we invented with the industrial revolution in a more efficient way. Thats why many of the problems that arose with industrial life have been exacerbated with the introduction of new digital technologies. Our cities are still machines that import goods and generate waste. We import hydrocarbons extracted from the subsoil of the earth to make plastics or fuels, which allow us to consume or move effectively while polluting the environment. Cities are also the recipients of the millions of containers filled with products that move around the world, and where we produce waste that creates mountains of garbage.

Read the full article here

We may imagine that one day, when a city was full of sensors to give it the ability of watching and hearing, data could be collected and analyzed as much as possible to make the city run more efficiently. Public space would be better managed to avoid any offense and crime, traffic flows be better monitored to avoid any traffic jam or traffic accident, public services be more evenly distributed to achieve social equity in space, land use be more reasonably zoned or rezoned to achieve a land value as high as possible, and so on. The city would function as a giant machine of high efficiency and rationality that would treat everyone and everything in the city as an element on the giant machine, under the supervision and in line with the values of the hidden eyes and ears. But, the city is not a machine, it is an organism composed of first of all numerous men who are often different one from another, and then the physical environment they create and shape in a collective way. Before the appearance of the city full of sensors, man needs to first work out a complete set of regulations on the utilization of sensors and the data they collect to deal with the issues of privacy and diversity.

Read the full article here

In his bookThe Second Digital Turn, Mario Carpo provides an incisive definition of the difference between artificial intelligence and "human" intelligence. Through the slogan "search, don't sort", he well describes how our way of using email has changed after the spread of Gmail:

We used to think that sorting saves time. It did; but it doesnt any more, because Google searches (in this instance, Gmail searches) now work faster and better. So taxonomies, at least in their more practical, utilitarian modeas an information retrieval toolare now useless. And of course computers do not have queries on the meaning of life, so they do not need taxonomies to make sense of the world, eitheras we do, or did.[Mario Carpo,The Second Digital Turn. Design Beyond Intelligence, MIT Press, Cambridge MA, 2017, p. 25.]

Machine-intelligence is an infinite search based on a finite request: Carpo's machine, which announces the second digital turn (or revolution?), is able to find a needle in a haystack - so long as someone asks it to look for a needle, for reasons that are still human. There is no longer any need for shelves, drawers, or taxonomies to narrow down the search-terms into increasingly coherent sets (as was the case with "sorting"). The machine will find the needle wherever it is, in the chaos of the pseudo-infinite space of the World Wide Web or, in a more general sense, of the "Big Data". It will do so in an instant. And herein lies its intelligence: it can look for a needle in a pseudo-infinite haystack (Big Data) at a very high speed (Big Calcula).

Read the full article here

Go here to read the rest:
6 Visions of How Artificial Intelligence will Change Architecture - ArchDaily

Read More..

Futuristic Impacts of AI Over Businesses and Society – Analytics Insight

In the past decade, artificial intelligence (AI) has made it to mainstream society from academic journals. The technology has achieved numerous milestones when it comes to digital transformation across society including businesses, education, and healthcare as well. Today people can do the tasks which were not even possible ten years back.

The proportion of organizations using AI in some form rose from 10 percent in 2016 to 37 percent in 2019 and that figure is extremely likely to rise further in the coming year, according to Gartners 2019 CIO Agenda survey.

While the breakthroughs in surpassing human ability at human pursuits, such as chess, make headlines, AI has been a standard part of the industrial repertoire since at least the 1980s. Then production-rule or expert systems became a standard technology for checking circuit boards and detecting credit card fraud. Similarly, machine-learning (ML) strategies like genetic algorithms have long been used for intractable computational problems, such as scheduling, and neural networks not only to model and understand human learning but also for basic industrial control and monitoring.

Moreover, AI is also the core of some of the most successful companies in history in terms of market capitalizationApple, Alphabet, Microsoft, and Amazon. Along with information and communication technology (ICT) more generally, the technology has revolutionized the ease with which people from all over the world can access knowledge, credit, and other benefits of a contemporary global society. Such access has helped lead to a massive reduction of global inequality and extreme poverty, for example by allowing farmers to know fair prices, the best crops, and giving them access to accurate weather predictions.

Following the trends, we can say that there will be big winners and losers as collaborative technologies, robots and artificial intelligence transform the nature of work. Moreover, data expertise will become exponentially more important. Across various organizations, the role of a senior manager in a deeply data-driven world is about to shift, thanks to the AI revolution. It is estimated that information hoarders will slow the pace of their organizations and forsake the power of artificial intelligence while competitors exploit it.

In the future, judgments about consumers and potential consumers will be made instantaneously and many organizations will put cybersecurity on par with other intelligence and defense priorities. Besides, open-source information and artificial intelligence collection will provide opportunities for global technological parity and soon predictive analytics and artificial intelligence could play an even more fundamental role in content creation.

With the growth of AI-enabled technologies in the future, societies will face challenges in realizing technologies that benefit humanity instead of destroying and intruding on the human rights of privacy and freedom of access to information. Also, the surging capabilities of robots and artificial intelligence will see a range of current jobs supplanted, where professional roles such as doctors, lawyers, and accountants could be replaced by artificial intelligence by the year 2025.

Moreover, low-skill workers will reallocate to tasks that are non-susceptible to computerization. All the risks will arise out of human activity from certain technological development in this technology, synthetic biology, nano techno, and artificial intelligence.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Smriti is a Content Analyst at Analytics Insight. She writes Tech/Business articles for Analytics Insight. Her creative work can be confirmed @analyticsinsight.net. She adores crushing over books, crafts, creative works and people, movies and music from eternity!!

See original here:
Futuristic Impacts of AI Over Businesses and Society - Analytics Insight

Read More..

Role of AI soars in tackling Covid-19 pandemic – BusinessLine

For the first time in a pandemic, Artificial Intelligence (AI) is playing a role like never before in areas ranging from diagnosing risk to doubt-clearing, from delivery of services to drug discovery in tackling the Covid-19 outbreak.

While BlueDoT, a Canadian health monitoring firm that crunches flight data and news reports using AI, is being credited by international reports to be the first to warn its clients of an impending outbreak on December 31, beating countries and international developmental agencies, the Indian tech space too is buzzing with coronavirus cracking activities.

CoRover, a start-up in the AI space that has earlier developed chatbots for railways ticketing platform, has now created a video-bot by collaborating with a doctor from Fortis Healthcare. In this platform, a real doctor from Fortis Healthcare not a cartoon or an invisible knowledge bank will take questions from people about Covid-19.

Apollo Hospitals has come up with a risk assessment scanner for Covid-19, which is available in six languages and guides people about the potential risk of having the virus. The Jaipur-based Sawai Man Singh Hospital is trying out a robot, made by robot maker Club First, to serve food and medicines to patients to lower the exposure of health workers to coronavirus patients.

This is the first time in healthcare that Artificial Intelligence, Machine Learning, and Natural Language Processing are being used to create a Virtual Conversational AI platform, which assists anyone to be able to interact with doctors and have their queries answered unlike other search engines, which do not guarantee the authenticity of information, CoRovers Ankush Sabharwal claimed, while talking of its video-bot, which is likely to be launched soon.

Sabharwal told BusinessLine that answers to numerous questions have been recorded by Pratik Yashavant Patil, a doctor from Fortis Healthcare. In his AI avatar, Doctor Patil will bust myths, chat with you and will probably have answers to a lot of your questions.

Another start-up, Innoplexus AG, headquartered in Germany but founded by Indians, is claiming that its AI-enabled drug discovery platform is helping to arrive at combinations of existing drugs that may prove more efficacious in treating Covid-19 cases.

Its AI platform, after scanning the entire universe of Covid-related data has thrown up results to show that Hydroxycholoroquine or Chroloquine, an anti-malaria drug that is being prescribed as a prophylactic for coronavirus under many protocols works more effectively with some other existing drugs than when it is used alone, the company claims.

Our analysis shows that Chloroquine works more effectively in combination with Pegasys (a drug used to treat Hepatitis C] or Tocilizumab, (a rheumatoid arthritis drug) or Remdesivir (yet to be approved antiviral drug for Ebola) or Clarithromycin (an antibiotic). We are hoping to work with drug regulators and partners to test these in pre-clinical and clinical trials, said Gunjan Bhardwaj, CEO, Innoplexus.

To be sure, hundreds of clinical trials are currently under way with several cocktails of medicines for Covid-19 across the world, and some of these drugs were part of trials held in China and Taiwan. The World Health Organization (WHO) itself is monitoring a global mega clinical trial for testing drugs for Covid-19 called solidarity, which India decided to join on Friday.

Link:
Role of AI soars in tackling Covid-19 pandemic - BusinessLine

Read More..

As adoption of artificial intelligence accelerates, can the technology be trusted? – SiliconANGLE News

The list of concerns around the use of artificial intelligence seems to grow with every passing week.

Issues around bias, the use of AI for deepfakevideos and audio,misinformation, governmental surveillance, securityand failure of the technology to properly identify the simplest of objects have created a cacophony of concern about the technologys long-term future.

One software company recently released a study which showed only 25% of consumers would trust a decision made by systems using AI, and another report commissioned by KPMG International found that a mere 35% of information technology leaders had a high level of trust in their own organizations analytics.

Its a bumpy journey for AI as the technology world embarks on a new decade and key practitioners in the space are well aware that trust will ultimately determine how widely and quickly the technology becomes adopted throughout the world.

We want to build an ecosystem of trust,Francesca Rossi, AI ethics global leader at IBM Corp., said at the digitalEmTech Digital conference on Monday. We want to augment human intelligence, not replace it.

The EmTech Digital event, restructured into a three-day digital conference by MIT Technology Review after plans to hold it this month in San Francisco were canceled, was largely focused on trust in AI and how the tech industry was seeking to manage a variety of issues around it.

One of those issues is the use of deepfake AI tools to create genuine appearing videos or audio to deceive users. The use of deepfake videos has been rising rapidly, according to recent statistics provided by Deeptrace, which found an 84% rise in false video content versus a year ago.

Today more than ever we cannot believe what we see, and we also cannot believe what we hear,Delip Rao, vice president of research at AI Foundation, said during an EmTech presentation on Tuesday. This is creating a credibility crisis.

To help stem the flow of deepfakes into the content pool, the AI Foundation has launched a platform,Reality Defender, thatuses deepfake detection methods provided by various partners, including Google LLC and Facebook Inc. The nonprofit group recently extended its detection technology to include 2020 election campaigns in the U.S. as well.

As a generation, we have consumed more media than any generation before us and were hardly educated about how we consume it, Rao said. We cannot afford to be complacent. The technology behind deepfakes is here to stay.

AI has also come under fire for its use in facial recognition systems powered by a significant rise in the installation of surveillance cameras globally. A recent report by IHS Markit showed that China leads the world with 349 million surveillance cameras. The U.S. has 70 million cameras, yet it is close to China on a per capita basis with 4.6 people per camera installed.

The rise of AI-equipped cameras and facial recognition software has led to the development of a cottage industry on both sides of the equation. One Chinese AI company SenseTime has claimed the development of an algorithm which can identify a person whose facial features are obscured by a surgical mask and use thermal imaging to determine body temperature.

Meanwhile, a University of Maryland professor has developed a line of clothing, including hoodies and t-shirts, emblazoned with patterns specially designed to defeat surveillance camera recognition systems. All of that underscores the growing societal challenges faced by practitioners in the AI field.

The other complex problem affecting the AI industry involves cybersecurity. As adoption grows and the tools improve, the use of AI is not limited to white hat users. Black hat hackers have access to AI as well and they have the capability to use it.

Cybersecurity vendor McAfee Inc. has seen evidence that hackers may be employing AI to identify victims likely to be vulnerable to attack, according to Steve Grobman, senior vice president and chief technology officer at McAfee. Malicious actors can also use the technology to generate customized content as a way to sharpen spear phishing lures.

AI is a powerful tool for both the defenders and the attackers, Grobman said. AI creates a new efficiency frontier for the attacker. Were seeing a constant evolution of attack techniques.

The trust issues surrounding AI represent an important focus right now because the AI train has left the station and a lot of passengers are on board for the ride. AI has become a key element in improving operational efficiency for many businesses and a number of speakers at the event outlined how enterprises are employing the technology.

Frito Lay Inc. uses AI to analyze weather patterns and school schedules to determine when its corn chip inventory should be increased on store shelves. Global healthcare provider Novartis AG is using AI to support clinical trials and determine injection schedules for people with macular degeneration.

And when engineers at shipping giant DHL International saw how AI could be used to detect cats in YouTube videos, they wondered if the same approach could be taken to inspect shipping pallets for stackability in cargo planes.

These are small decisions were doing for load efficiency on over 500 flights per night, said Ben Gesing, DHLs director and head of trend research. At DHL, no new technology has been as pervasive or as fast-growing as AI.

Perhaps even more intriguing was the recent news that Salesforce Inc. has employed AI to undertake major research on protein generation. Earlier this month, Salesforce published a study which detailed a new AI system called ProGen that can generate proteins in a controllable fashion.

In a presentation Tuesday, Salesforce Chief ScientistRichard Socherdescribed how the company viewed AI as a double-edged strategy. One is the science fiction state, in which dreams of self-driving cars and big medical breakthroughs reside. The other is the electricity state, which uses technology such as natural language understanding to power chatbots.

AI is in this dual state right now, Socher said. At Salesforce, were trying to tackle both of those states. I truly believe that AI will impact every single industry out there.

If Socher is right, then every industry is going to have to deal with a way to engender trust in how it uses the technology. One EmTech speaker presented results from a recent Deloitte study which found that only one in five CEOs and executives polled had an ethical AI framework in place.

There are challenges ahead of us, said Xiaomeng Lu, senior policy manager at Access Partnership. We cant run away. We have to tackle them head on.

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.

Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.

Read more from the original source:
As adoption of artificial intelligence accelerates, can the technology be trusted? - SiliconANGLE News

Read More..

GLOBAL INTERNET SECURITY FIREWALL MARKET LATEST DEVELOPMENTS, SHARES, AND STRATEGIES EMPLOYED BY THE MAJOR PLAYERS – The Fuel Fox

This report focuses on Global Internet Security Firewall Market status, future forecast, growth opportunity, key market, and key players. The study objectives are to present the Internet Security Firewall Market development in the United States, Europe, and China.

In 2019, the global Internet Security Firewall Market size was million US$ and it is expected to reach million US$ by the end of 2025, with a CAGR of during 2025-2025.

The report also summarizes the various types of Internet Security Firewall Market. Factors that influence the market growth of particular product category type and market status for it. A detailed study of the Internet Security Firewall Market has been done to understand the various applications of the usage and features of the product. Readers looking for scope of growth with respect to product categories can get all the desired information over here, along with supporting figures and facts.

Get Sample: https://www.lexisbusinessinsights.com/request-sample-120202

Top Key players: SAP, Hewlett Packard Enterprise, Cellusys, Openmind Networks, Tata Communications, ANAM Technologies, AMD Telecom, Adaptive Mobile, Infobip, EVOLVED INTELLIGENCE, MOBILEUM, and OMOBIO

Internet Security Firewall Market: Regional Segment Analysis.

This report provides pin-point analysis for changing competitive dynamics. It offers a forward-looking perspective on different factors driving or limiting market growth. It provides a five-year forecast assessed based on how the Internet Security Firewall Market is predicted to grow. It helps in understanding the key product segments and their future and helps in making informed business decisions by having complete insights of market and by making an in-depth analysis of market segments.

Key questions answered in the report include:

What will the market size and the growth rate be in 2026?

What are the key factors driving the Global Internet Security Firewall Market?

What are the key market trends impacting the growth of the Global Internet Security Firewall Market?

What are the challenges to market growth?

Who are the key vendors in the Global Internet Security Firewall Market?

What are the market opportunities and threats faced by the vendors in the Global Internet Security Firewall Market?

Trending factors influencing the market shares of the Americas, APAC, Europe, and MEA.

The report includes six parts, dealing with:

1.) Basic information;

2.) The Asia Internet Security Firewall Market;

3.) The North American Internet Security Firewall Market;

4.) The European Internet Security Firewall Market;

5.) Market entry and investment feasibility;

6.) The reports conclusion.

All the research report is made by using two techniques that are Primary and secondary research. There are various dynamic features of the business, like client need and feedback from the customers. Before (company name) curate any report, it has studied in-depth from all dynamic aspects such as industrial structure, application, classification, and definition.

The report focuses on some very essential points and gives a piece of full information about Revenue, production, price, and market share.

Internet Security Firewall Market report will enlist all sections and research for every point without showing any indeterminate of the company.

Reasons for Buying this Report

This report provides pin-point analysis for changing competitive dynamics

It provides a forward-looking perspective on different factors driving or restraining the market growth

It provides a six-year forecast assessed based on how the market is predicted to grow

It helps in understanding the key product segments and their future

It provides pin point analysis of changing competition dynamics and keeps you ahead of competitors

It helps in making informed business decisions by having complete insights of market and by making an in-depth analysis of market segments

TABLE OF CONTENT:

1 Report Overview

2 Global Growth Trends

3 Market Share by Key Players

4 Breakdown Data by Type and Application

5 United States

6 Europe

7 China

8 Japan

9 Southeast Asia

10 India

11 Central & South America

12 International Players Profiles

13 Market Forecast 2025-2025

14 Analysts Viewpoints/Conclusions

15 Appendix

Get Global Internet Security Firewall Market Complete Brochure @ https://www.lexisbusinessinsights.com/request-sample-120202

About Us:

Statistical surveying reports is a solitary goal for all the business, organization and nation reports. We highlight a huge archive of most recent industry reports, driving and specialty organization profiles, and market measurements discharged by rumored private distributors and open associations. Statistical surveying Store is the far-reaching gathering of market knowledge items and administrations accessible on air. We have statistical surveying reports from a number of driving distributors and update our gathering day by day to furnish our customers with the moment online access to our database. With access to this database, our customers will have the option to profit by master bits of knowledge on worldwide businesses, items, and market patterns

Contact Us:

Lexis Business Insights

Aaryan

(Director- Business Development)

US: +1 210 907 4145

APAC: +91 98677 99788

[emailprotected]

http://www.lexisbusinessinsights.com

See the original post:
GLOBAL INTERNET SECURITY FIREWALL MARKET LATEST DEVELOPMENTS, SHARES, AND STRATEGIES EMPLOYED BY THE MAJOR PLAYERS - The Fuel Fox

Read More..

Coronavirus Proves We Need the Internet Now More than Ever Before – The National Interest

As more and more U.S. schools and businesses shutter their doors, the rapidly evolving coronavirus pandemic is helping to expose societys dependence good and bad on the digital world.

Entire swaths of society, including classes we teach at American University, have moved online until the coast is clear. As vast segments of society are temporarily forced into isolation to achieve social distancing, the internet is their window into the world. Online social events like virtual happy hours foster a sense of connectedness amid social distancing. While the online world is often portrayed as a societal ill, this pandemic is a reminder of how much the digital world has to offer.

The pandemic also lays bare the many vulnerabilities created by societys dependence on the internet. These include the dangerous consequences of censorship, the constantly morphing spread of disinformation, supply chain vulnerabilities and the risks of weak cybersecurity.

1. Chinas censorship affects us all

The global pandemic reminds us that even local censorship can have global ramifications. Chinas early suppression of coronavirus information likely contributed to what is now a worldwide pandemic. Had the doctor in Wuhan who spotted the outbreak been able to speak freely, public health authorities might have been able to do more to contain it early.

China is not alone. Much of the world lives in countries that impose controls on what can and cannot be said about their governments online. Such censorship is not just a free speech issue, but a public health issue as well. Technologies that circumvent censorship are increasingly a matter of life and death.

2. Disinformation online isnt just speech its also a matter of health and safety

During a public health emergency, sharing accurate information rapidly is critical. Social media can be an effective tool for doing just that. But its also a source of disinformation and manipulation in ways that can threaten global health and personal safety something tech companies are desperately, yet imperfectly, trying to combat.

Facebook, for example, has banned ads selling face masks or promising false preventions or cures, while giving the World Health Organization unlimited ad space. Twitter is placing links to the Centers for Disease Control and Prevention and other reliable information sources atop search returns. Meanwhile, Russia and others reportedly are spreading rumors about the coronaviruss origins. Others are using the coronavirus to spread racist vitriol, in ways that put individuals at risk.

Not only does COVID-19 warn us of the costs and geopolitics of disinformation, it highlights the roles and responsibilities of the private sector in confronting these risks. Figuring out how to do so effectively, without suppressing legitimate critics, is one of the greatest challenges for the next decade.

3. Cyber resiliency and security matter more than ever

Our university has moved our work online. We are holding meetings by video chat and conducting virtual courses. While many dont have this luxury, including those on the front lines of health and public safety or newly unemployed, thousands of other universities, businesses and other institutions also moved online a testament to the benefits of technological innovation.

At the same time, these moves remind us of the importance of strong encryption, reliable networks and effective cyber defenses. Today network outages are not just about losing access to Netflix but about losing livelihoods. Cyber insecurity is also a threat to public health, such as when ransomware attacks disrupt entire medical facilities.

4. Smart technologies as a lifeline

The virus also exposes the promise and risks of the internet of things, the globe-spanning web of always-on, always-connected cameras, thermostats, alarm systems and other physical objects. Smart thermometers, blood pressure monitors and other medical devices are increasingly connected to the web. This makes it easier for people with pre-existing conditions to manage their health at home, rather than having to seek treatment in a medical facility where they are at much greater risk of exposure to the disease.

Yet this reliance on the internet of things carries risks. Insecure smart devices can be co-opted to disrupt democracy and society, such as when the Mirai botnet hijacked home appliances to disrupt critical news and information sites in the fall of 2016. When digitally interconnected devices are attacked, their benefits suddenly disappear adding to the sense of crisis and sending those dependent on connected home diagnostic tools into already overcrowded hospitals.

5. Tech supply chain is a point of vulnerability

The shutdown of Chinese factories in the wake of the pandemic interrupted the supply of critical parts to many industries, including the U.S. tech sector. Even Apple had to temporarily halt production of the iPhone. Had China not begun to recover, the toll on the global economy could have been even greater than it is now.

This interdependence of our supply chain is neither new nor tech-specific. Manufacturing medical and otherwise has long depended on parts from all over the world. The crisis serves as a reminder of the global, complex interactions of the many companies that produce gadgets, phones, computers and many other products on which the economy and society as a whole depend. Even if the virus had never traveled outside of China, the effects would have reverberated highlighting ways in which even local crises have global ramifications.

Cyber policy in everything

As the next phase of the pandemic response unfolds, society will be grappling with more and more difficult questions. Among the many challenges are complex choices about how to curb the spread of the disease while preserving core freedoms. How much tracking and surveillance are people willing to accept as a means of protecting public health?

As Laura explains in The Internet in Everything, cyber policy is now entangled with everything, including health, the environment and consumer safety. Choices that we make now, about cybersecurity, speech online, encryption policies and product design will have dramatic ramifications for health, security and basic human flourishing.

[Get facts about coronavirus and the latest research. Sign up for our newsletter.]

Laura DeNardis, Professor of Communication Studies, American University School of Communication and Jennifer Daskal, Professor of Law and Faculty Director, Technology, Law & Security Program, American University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Image: Reuters.

More:
Coronavirus Proves We Need the Internet Now More than Ever Before - The National Interest

Read More..

The story behind that little padlock in your browser – Horizon magazine

Behind that little padlock is cryptographic code that guarantees the security of data passing between you and, for example, the website you are looking at.

In fact, TLS guarantees security on three fronts: authentication, encryption and integrity. Authentication, so that your data goes where you think it is going; encryption, so that it does not go anywhere else; and integrity, so that it is not tampered with en route.

Its the most popular security protocol on the internet, securing essentially every e-commerce transaction, Eric Rescorla, chief technology officer at US technology company Mozilla, told Horizon over email.

In the two decades leading up to 2018, there were five overhauls of TLS to keep pace with the sophistication of online attacks. After that, many experts believed that the latest incarnation, TLS1.2, was safe enough for the foreseeable future,until researchers such as Dr Karthikeyan Bhargavan and his colleagues at the French National Institute for Research in Digital Science and Technology (INRIA) in Paris came along.

Scaffold

As part of a project called CRYSP, the researchers had been working on ways to improve the security of software applications. Usually, software developers rely on TLS like a builder relies on a scaffold in other words, they take its safety for granted.

To improve security at the software level, however, Dr Bhargavan and colleagues had to thoroughly check that the underlying assumptions about TLS1.2 that it had no serious flaws were justified.

At some point, we realised they werent, he said.

After discovering some shaky lines of code, the researchers worked with Microsoft Research and took on the role of hackers, performing some simulated attacks on the protocol to test the extent of its vulnerability. The attacks revealed that it was possible to be a man in the middle between an internet user and a service provider, such as Google, and thereby steal that users data.

It would have to be a fairly complex sequence of actions, explained Dr Bhargavan. Typically, the person in the middle would have to send weird messages to each actor to lure them into a buggy part of the code.

If, as the person in the middle, I was successful, I could potentially steal someones payment details, he continued. Or I could pretend to be Apple or Google, and download (insert) malware via a software update to get access to peoples computers.

Serious threat

Such a hacker would need great expertise and computational power, that of a government agency, for example, as well as access to some of the physical infrastructure close to the key actors. Nevertheless, the Internet Engineering Task Force (IETF), an international organisation promoting internet standards, judged the threat to be sufficiently serious to warrant a new version of the cryptographic protocol.

Dr Bhargavan points out that he was far from the only computer scientist to prompt the revision. There were four or five other research groups unearthing problems with the current protocol, pushing one another along, he says, in a healthy rivalry.

Still, he says that his group discovered some of the most surprising flaws in TLS1.2, which he believes may have been the final nails in the coffin for the protocol.

His group was also part of a broad collaboration within the internet community, overseen by an IETF working group, to construct the more secure, and man-in-the-middle-proof successor that is TLS 1.3, using modern algorithms and techniques. Dr Bhargavan was a key player in that effort, said Rescorla who oversaw TLS at the IETF at the time of the work.

TLS 1.3 was officially launched in August 2018. Since then it has been implemented by major internet browsers such as Mozilla Firefox and Google Chrome.

So long as you click that padlock you have some confidence about safety.

Dr Karthikeyan Bhargavan, INRIA, France

So how much safer are internet users as a result?

Human error

It is true that for most online security breaches, TLS is not to blame. Usually, personal data gets into the wrong hands because of bugs in software what Dr Bhargavans group was working on to begin with or human error.

But Dr Bhargavan believes there is reassurance in knowing that the underlying protocol is secure. Its not everything, but so long as you click that padlock you have some confidence about safety its the most basic thing, he said.

Besides, internet users are not only worried about hackers. Since 2013, and the leaks of Edward Snowden, a former employee of a US National Security Agency contractor, many people are concerned about the amount of personal data amassed by state intelligence and large enterprises.

Designed with the Snowden revelations in mind, TLS 1.3 closes the door to some types of this pervasive network-based monitoring through its encryption of both user data and metadata. It also prevents retrospective decryption one of the previous versions weaknesses.

There was a long discussion in the IETF working group about whether preventing surveillance was one of the goals of TLS, says Dr Bhargavan. And the answer was ultimately in the positive, he said.

Now Dr Bhargavan is returning to the issue of software security. He believes the majority of remaining vulnerabilities can be eliminated at the design stage.

Verified

To do this, he and his colleagues are constructing a library, HACL*, of fully verified cryptographic code, which other developers can draw on when building new software. In this project, known as CIRCUS, they are also creating an easy-to-follow reference paradigm that tells developers how to put software together without introducing security glitches.

The resultant high-assurance software has already been taken up by developers at Mozilla and Microsoft, among others. We want everyone to be following these techniques, Dr Bhargavan said.

Ultimately, his goal is not to secure everything online, but to find the safest spots within our highly complex computer systems. I dont think we will ever get to a point where everything is verified, he said, but we can find the most secure basket in which we can put our keys and passwords and financial data.

The research in this article was funded by the European Research Council. Dr Bhargavan is a recipient of a 2019 Horizon Impact Award for societal impact across Europe and beyond.

If you liked this article, please consider sharing it on social media.

Read the original here:
The story behind that little padlock in your browser - Horizon magazine

Read More..

Finder helps secure the Internet in a time of crisis – CMO

Finder has released a solution for secure online identity verification for banking details in its new app, a very timely solution given the current necessity for Australians to self isolate.

With the COVID-19 pandemic pushing Australia to the edge of a recession, more Australians will be looking online to see how they can find better deals to save money and reduce unnecessary spending. As more people go online, there becomes a greater risk of Australians being attacked by cyber criminals and having their personal information compromised, Finder said.

With 2.6 million unique monthly visitors, Finder wanted to reinvent its membership program back in 2018. While Finders existing model wasnt broken, it saw an opportunity to better serve users by leading the development of the Finder app, which aims to connect users bank accounts to track their spending habits and identify where they could save by switching products.

To do this, Finder needed a robust security solution that would keep users financial data secure.

The Finder app is designed to find members better deals for credit cards, home loans, savings accounts and health insurance. It does this by linking users financial data for analysis across thousands of financial products and notifies them of potential savings across those four main categories.

As Australia enters a new open data sharing landscape with Open Banking just around the corner, there is also a growing requirement for companies to be proactive in sourcing robust security solutions to maintain customer trust and loyalty when dealing with private details, such as email addresses, phone numbers, banking details and credit scores. COVID-19 has brought this need for remote security to the forefront even more.

Using multiple user systems, including a main website service and credit score service, meant Finder needed a solution that utilised a number of features to improve user data security and to consolidate several stores of user data into one unified system.

Finder chief product and technology officer, Joe Walker, said the aim was a defence in-depth security strategy.

If you've somehow gotten through the castle walls, we dont necessarily assume that just because youre inside, youre allowed to be inside. Its safer to keep running additional checks, and so we continue to re-authenticate users," he said.

Trying to build out authentication ourselves would divert all of the hundreds of engineers that we have working on key products and features for our members.

"We wanted to reduce the potential attack surface, and consolidating our member data into a single, secure system was the best approach. When our users provide us withmembership and financial information, they are placing a level of trust in us, and its important that we honour that trust."

When Finder began moving towards a microservices architecture and building their app, the company sought out an authentication provider that could provide strong security. Once the decision to use Auth0 was made, Finder started to migrate hundreds of thousands of user accounts to the new system.

The Finder app launched in mid-March, with plans to roll it out in the UK and the US. Within the first week of launching, the group received 10,000 downloads of the new app. With this many downloads comes the need for a robust platform that secures and authenticates personal information continuously, to prevent fraudulent activity and identity theft.

One of the security features Finder uses is anomaly detection. It prevents malicious attempts to access the website or the Mobile application as well as block further login attempts.

Finder further secures data by fully integrating Auth0 into their membership flow, with tokens refreshing regularly. This continuous authentication strengthens the walls of Finders data fortress.

For me, a secure member platform is a license to innovate safely and securely. Without a solid member platform thats secure, we wouldnt be able to innovate as quickly as we do. Any future work that we create, we make from eligibility programs or membership data which Auth0 has made possible, Walker added.

Follow CMO on Twitter:@CMOAustralia, take part in the CMO conversation on LinkedIn:CMO ANZ,follow our regular updatesvia CMO Australia's Linkedin company page, or join us on Facebook:https://www.facebook.com/CMOAustralia.

See more here:
Finder helps secure the Internet in a time of crisis - CMO

Read More..

New Security Report from WatchGuard Shows Explosion in Evasive Malware – socPub

Report finds macOS adware and 2017 Excel exploit running rampant and includes analysis of keylogger malware used in coronavirus-related phishing attacks.

24 March 2020 WatchGuard Technologies latest Internet Security Report shows that evasive malware has grown to record high levels, with over two-thirds of malware detected by its Firebox security appliances in Q4 2019 evading signature-based antivirus solutions. This is a dramatic increase from the year-long average of 35% for 2019 and points to the fact that obfuscated or evasive malware is becoming the rule, not the exception. Companies of all sizes need to deploy advanced anti-malware solutions that can detect and block these attacks.

In addition, WatchGuard found widespread phishing campaigns exploiting a Microsoft Excel vulnerability from 2017. This dropper exploit was number seven on WatchGuards top ten malware list and heavily targeted the UK, Germany and New Zealand. It downloads several other types of malware onto victims systems, including a keylogger named Agent Tesla that was used in phishing attacks in February 2020 that preyed on early fears of the coronavirus outbreak.

Our findings from Q4 2019 show that threat actors are always evolving their attack methods, said Corey Nachreiner, chief technology officer at WatchGuard. With over two-thirds of malware in the wild obfuscated to sneak past signature-based defenses, and innovations like Mac adware on the rise, businesses of all sizes need to invest in multiple layers of security. Advanced AI or behavioral-based anti-malware technology and robust phishing protection like DNS filtering will be especially crucial.

WatchGuards Internet Security Report prepares businesses, service providers and end users with the data, trends, research and best practices they need to defend against todays security threats. Other key findings from the Q4 2019 report include:

The findings included in WatchGuards Internet Security Report are drawn from anonymized Firebox Feed data from active WatchGuard UTM appliances whose owners have opted in to share data to support the Threat Labs research efforts. Today, over 40,000 appliances worldwide contribute threat intelligence data to the report. In Q4 2019, they blocked over 34,500,000 malware variants in total (859.5 samples per device) and approximately 1,879,000 network attacks (47 attacks per device).

The complete report also includes key defensive best practices that organizations of all sizes can use to protect themselves in todays threat landscape and a detailed analysis the MageCart JavaScript malware used in the Macys payment card data breach in October 2019.

For more information, download the full report on WatchGuard's website.

Link:
New Security Report from WatchGuard Shows Explosion in Evasive Malware - socPub

Read More..